CVE-2025-32990
GnuTLS vulnerability analysis and mitigation

Overview

A heap-buffer-overflow (off-by-one) vulnerability was discovered in the GnuTLS software, specifically in the template parsing logic within the certtool utility. The vulnerability was disclosed on July 10, 2025, and affects the GnuTLS package across multiple platforms including Ubuntu and Red Hat Enterprise Linux distributions. This security issue has been assigned CVE-2025-32990 with a CVSS v3.1 base score of 6.5 (Medium severity) (NVD, Red Hat Security).

Technical details

The vulnerability is classified as a heap-based buffer overflow (CWE-122) that occurs when the certtool utility reads certain settings from a template file. The flaw allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, which can lead to memory corruption. The vulnerability has been assigned a CVSS v3.1 vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L, indicating that it can be exploited remotely with low attack complexity and requires no privileges or user interaction (Snyk, Red Hat Security).

Impact

The exploitation of this vulnerability can result in memory corruption and denial-of-service (DoS) conditions that could potentially crash the system. While there is no direct impact on confidentiality, the vulnerability does affect system integrity and availability at a low level. The impact is particularly concerning for systems that rely on the GnuTLS certtool utility for certificate management operations (Ubuntu Security, NVD).

Mitigation and workarounds

Several Linux distributions have released patches to address this vulnerability. Ubuntu has released updates for versions 25.04, 24.04 LTS, and 22.04 LTS. For Debian 12, users should upgrade the gnutls28 package to version 3.7.9-2+deb12u5 or higher. Red Hat has marked this issue as 'Fix deferred' for some products while others are marked as 'Affected' (Ubuntu Security, Snyk).

Additional resources


SourceThis report was generated using AI

Related GnuTLS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-32990HIGH8.2
  • GnuTLSGnuTLS
  • gnutls28
NoYesJul 10, 2025
CVE-2025-32988HIGH8.2
  • GnuTLSGnuTLS
  • libgnutls30-32bit
NoYesJul 10, 2025
CVE-2025-6395MEDIUM6.5
  • GnuTLSGnuTLS
  • mingw32-gnutls-debuginfo
NoYesJul 10, 2025
CVE-2025-32989MEDIUM5.3
  • GnuTLSGnuTLS
  • cpe:2.3:a:redhat:openshift_container_platform
NoYesJul 10, 2025
CVE-2024-12243MEDIUM5.3
  • GnuTLSGnuTLS
  • libgnutlsxx30
NoYesFeb 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management